多项选择题
You are developing several tag libraries that will be sold for development of third-party web applications.You are about to publish the first three libraries as JAR files: container-tags.jar,advanced-html-form-tags.jar, and basic-html-form-tags.jar.
Which two techniques are appropriate for packaging the TLD files forthese tag libraries?()
A.The TLD must be located within the WEB-INF directory of the JAR file.
B.The TLD must be located within the META-INF directory of the JAR file.
C.The TLD must be located within the META-INF/tld/ directory of the JAR file.
D.The TLD must be located within a subdirectory of WEB-INF directory of the JAR file.
E.The TLD must be located within a subdirectory of META-INF directory of the JAR file.
相关考题
-
多项选择题
Whichtwosecuritymechanismscanbedirectedthroughasub-elementoftheelementinawebapplicationdeploymentdescriptor?()
A.Authorization
B.Data integrity
C.Confidentiality
D.Authentication -
单项选择题
Whichsecuritymechanismusestheconceptofarealm?()
A.Authorization
B.Data integrity
C.Confidentiality
D.Authentication -
单项选择题
WhichbasicauthenticationtypeisoptionalforaJ2EE1.4compliantwebcontainer?()
A.HTTP Basic Authentication
B.Form Based Authentication
C.HTTP Digest Authentication
D.HTTPS Client Authentication
